Cyber claim

Need to make a claim? Find the information you are looking for here
Cyber Claims 1

What you'll need before you begin

Surveyors

Call the insurers early intervention helplines which are 24 hours

Surveyors

Do not hold up notifying insurers while gathering evidence

Surveyors

Policy number and any other relevant details about your coverage

Surveyors

Contact name, address, phone number, and email address

Surveyors

Full circumstances of how internal controls have been compromised

Surveyors

Police report reference

Notify us of your claim

Please select your branch from the dropdown list below, all online claims notifications will be reviewed within 48 hours. Please complete as much information as possible so that we can help process your claim.

London Great Tower Street Contact information

Claims contact number

Out of hours number

Claims email address

Upload up to 3 files. Max file size: 5MB per file

clear group
Thank you for your email, a member of the claims team will endeavour to respond in the next 2 working days, if the matter is urgent, then please call the phone number aligned to your nearest branch.
Oops! Something went wrong while submitting the form.

What happens next?

Info Icon

Insurers will review cover subject to policy and inner limits

Info Icon

Confirmation from the bank confirming notification of the breach

Info Icon

Provide extracts from bank statements showing fraudulent payments

Info Icon

Supply copies of any fraudulent email(s)/invoice(s) received

Info Icon

Provide evidence that the payments were not legitimate

Info Icon

Provide any available details about the beneficiary accounts

Frequently asked claims questions

Answers to questions that you might find useful. Can't find what you're looking for? Get in touch, our dedicated claims team will be happy to help.

Do I have to pay an excess?

Yes, you will have to pay a policy excess, which is noted on your policy schedule.

How long does it take a to process a claim?

This will depend upon insurers completing investigations and prompt responses to requests for information.

Will my premium increase following a claim?

Possibly, however difficult to confirm as other claims under the policy will be considered in addition, market conditions will also be relevant and until the claim settles reserves are applied based on information available at the time.

What is cybersecurity?

Cybersecurity is a compilation of technology and network interface processes created to protect your company's network, programs, computers and data from a cyber-attack.

What constitutes a cyber-attack?

A cyber-attack is when an outside entity infiltrates your business's private network to shut down and steal your company's, your employees, and your clients, sensitive information. This stolen information can be used for ransom and disseminated to the public.

How does cyber insurance coverage work?

Cybersecurity insurance coverage includes the loss of sensitive information through a data breach after your company has permitted or failed to stop unsanctioned user access to your company network. Cyber insurance covers notification costs, litigation costs, fines and penalties.

Who is vulnerable to a cyber-attack?

Everyone is vulnerable to a cyber-attack. If you have a website or social media presence, you are a target.

Are there different types of cyber-attacks?

Yes, there are different types of cyber-attacks. Types of attacks include: the Trojan Horse, Phishing, Unpatched Software and the most well-known of them all, Malware.

What is Malware?

Malware is used to disable and damage computers and networking systems.

Is there a difference between a cyber risk and a cyber threat?

Yes. A cyber risk is the risk at which your company can lose money or sensitive information. A cyber threat includes how a cybercriminal can infiltrate your network and halt or dispense your system and its confidential information.